This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Security Checks | |
on: | |
push: | |
branches: ['*'] | |
pull_request: | |
branches: ['*'] | |
jobs: | |
static_code_analysis: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Checkout Repository | |
uses: actions/checkout@v2 | |
- name: Static Code Analysis | |
run: sonar-scanner | |
- name: Upload SonarQube Report | |
uses: actions/upload-artifact@v2 | |
with: | |
name: sonarqube-report | |
path: sonarqube-report.txt | |
dependency_scanning: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Checkout Repository | |
uses: actions/checkout@v2 | |
- name: Dependency Scanning | |
run: snyk test | |
container_scanning: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Checkout Repository | |
uses: actions/checkout@v2 | |
- name: Container Image Scanning | |
run: trivy image --severity HIGH,CRITICAL mydockerimage:latest | |
dast_scan: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Checkout Repository | |
uses: actions/checkout@v2 | |
- name: DAST Scan | |
run: zap-cli --start-scan --spider target_url --scan target_url --html-report zap-report.html | |
secret_detection: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Checkout Repository | |
uses: actions/checkout@v2 | |
- name: Secret Detection | |
run: detect-secrets scan | |
security_linting: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Checkout Repository | |
uses: actions/checkout@v2 | |
- name: Security Linting | |
run: bandit -r . | |
security_tests: | |
runs-on: ubuntu-latest | |
steps: | |
- name: Checkout Repository | |
uses: actions/checkout@v2 | |
- name: Security Tests |